Argus Cyber Security Ltd.

Israel

Back to Profile

1-35 of 35 for Argus Cyber Security Ltd. Sort by
Query
Aggregations
Jurisdiction
        United States 30
        World 5
Date
2022 1
2020 3
2019 7
Before 2019 24
IPC Class
H04L 29/06 - Communication control; Communication processing characterised by a protocol 27
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure 24
H04L 12/40 - Bus networks 17
B60R 16/023 - Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric for transmission of signals between vehicle parts or subsystems 15
G06F 21/55 - Detecting local intrusion or implementing counter-measures 12
See more
Status
Pending 2
Registered / In Force 33
Found results for  patents

1.

System and method for controlling access to an in-vehicle communication network

      
Application Number 17869792
Grant Number 11755713
Status In Force
Filing Date 2022-07-21
First Publication Date 2022-11-17
Grant Date 2023-09-12
Owner Argus Cyber Security Ltd. (Israel)
Inventor
  • Ben-Noon, Ofer
  • Galula, Yaron
  • Lavi, Oron

Abstract

A system or method may include an in-vehicle network including an interface port for connecting an external device to the in-vehicle network; and a security unit connected to the in-vehicle network, the security unit adapted to enable an external device to communicate with the in-vehicle network, over the interface port, based on a security token received from the external device. A system or method may, based on a token, prevent an external device from at least one of: communicating with a selected set of components on in an in-vehicle network, communicating with a selected set of network segments in the in-vehicle network and performing a selected set of operations.

IPC Classes  ?

  • G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/40 - Network security protocols
  • H04W 12/06 - Authentication
  • H04W 12/069 - Authentication using certificates or pre-shared keys
  • H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

2.

SYSTEM AND METHOD FOR DETECTING EXPLOITATION OF A COMPONENT CONNECTED TO AN IN-VEHICLE NETWORK

      
Application Number 16637770
Status Pending
Filing Date 2018-08-09
First Publication Date 2020-07-09
Owner Argus Cyber Security Ltd (Israel)
Inventor
  • Galula, Yaron
  • Kruvi, Nizzan

Abstract

A system and method for detecting cyber threats in a vehicle may detecting an event related to exploitation of a component connected to an in-vehicle network based on a deviation of execution of executable code from a reference execution behavior. A deviation may be detected based on a set of whitelists and blacklists. An event related to a deviation may be recorded.

IPC Classes  ?

  • B60W 60/00 - Drive control systems specially adapted for autonomous road vehicles
  • H04W 12/00 - Security arrangements; Authentication; Protecting privacy or anonymity
  • G08G 1/00 - Traffic control systems for road vehicles

3.

System and method for time based anomaly detection in an in-vehicle communication

      
Application Number 16789445
Grant Number 11277427
Status In Force
Filing Date 2020-02-13
First Publication Date 2020-06-11
Grant Date 2022-03-15
Owner Argus Cyber Security Ltd. (Israel)
Inventor
  • Ben-Noon, Ofer
  • Galula, Yaron
  • Kapota, Ofer
  • Kovelman, Alexei

Abstract

A system and method for providing security to a network may include maintaining, by a processor, a model of an expected behavior of data communications over the in-vehicle communication network; receiving, by the processor, a message sent over the network; determining, by the processor, based on the model and based on a timing attribute of the message, whether or not the message complies with the model; and if the message does not comply with the model then performing, by the processor, at least one action related to the message.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
  • G07C 5/08 - Registering or indicating performance data other than driving, working, idle, or waiting time, with or without registering driving, working, idle, or waiting time
  • H04W 12/10 - Integrity
  • H04W 12/12 - Detection or prevention of fraud
  • H04W 4/48 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for in-vehicle communication
  • H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
  • H04W 12/61 - Time-dependent
  • H04W 12/67 - Risk-dependent, e.g. selecting a security level depending on risk profiles
  • H04W 12/68 - Gesture-dependent or behaviour-dependent

4.

System and method for detection and prevention of attacks on in-vehicle networks

      
Application Number 16666445
Grant Number 11303661
Status In Force
Filing Date 2019-10-29
First Publication Date 2020-02-27
Grant Date 2022-04-12
Owner Argus Cyber Security Ltd (Israel)
Inventor
  • Galula, Yaron
  • Ben-Noon, Ofer
  • Lavi, Oron

Abstract

Systems and methods for detection of attacks on a communication authentication layer of an in-vehicle network, including determining, by at least one network node, at least one attack attempt on the communication authentication layer of the in-vehicle network, wherein the determination is carried out by identifying anomalies in at least one of messages, data and metadata directed to the communication authentication layer, and selecting, by the at least one network node, a response corresponding to the determined attack attempt from at least one of modification of parameter values corresponding to a security protocol, a failsafe response, and rejection of messages identified as anomalies.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/40 - Bus networks
  • H04L 69/40 - Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure of a protocol instance or entity, e.g. service redundancy protocols, protocol state redundancy or protocol service redirection
  • H04L 67/50 - Network services
  • G06F 21/85 - Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
  • H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
  • H04W 4/48 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for in-vehicle communication

5.

Cryptic vehicle shield

      
Application Number 16278775
Grant Number 11184388
Status In Force
Filing Date 2019-02-19
First Publication Date 2019-08-22
Grant Date 2021-11-23
Owner Argus Cyber Security Ltd. (Israel)
Inventor
  • Shalev, Amos
  • Galula, Yaron

Abstract

A method of providing an alert of an occurrence of a hacker intrusion, the method comprising: detecting a hacker intrusion; and transmitting a concealed or camouflaged report of the hacker intrusion to provide an alert of the occurrence of the intrusion.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

6.

SYSTEM AND METHOD FOR MANAGING PROGRAM MEMORY ON A STORAGE DEVICE

      
Application Number IL2018051113
Publication Number 2019/077607
Status In Force
Filing Date 2018-10-17
Publication Date 2019-04-25
Owner ARGUS CYBER SECURITY LTD. (Israel)
Inventor
  • Hammer, Lior
  • Barzilay, Gilad
  • Galula, Yaron

Abstract

A system and a method of managing program memory on a storage device. The method may include: receiving storage block information, including at least one of: storage block size of a storage device and block utilization limit of the storage device; receiving at least one first object file including a plurality of object code segments and a respective plurality of linker placeholders; sparsely stacking the object code segments to produce two or more libraries according to the storage block information; replacing the plurality of linker placeholders with actual addresses of sections of program memory according to the stacking of object code segments; and storing the plurality of object code segments on the storage device according to the actual addresses.

IPC Classes  ?

  • G06F 12/02 - Addressing or allocation; Relocation
  • G06F 9/445 - Program loading or initiating
  • G11C 7/00 - Arrangements for writing information into, or reading information out from, a digital store

7.

OS monitor

      
Application Number 16217079
Grant Number 11458911
Status In Force
Filing Date 2018-12-12
First Publication Date 2019-04-18
Grant Date 2022-10-04
Owner ARGUS CYBER SECURITY LTD. (Israel)
Inventor
  • Ben Noon, Ofer
  • Galula, Yaron
  • Lavi, Oron

Abstract

An in-vehicle communication network comprising a bus and at least one node connected to the bus; an in-vehicle network operating system (OS) that manages OS processes, to enable a processor to run the processes and execute their respective process codes; and a module hosted in the OS that is configured to monitor the OS and vet a process that the OS enables for running by a processor to determine if the process is potentially damaging.

IPC Classes  ?

  • B60R 16/023 - Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric for transmission of signals between vehicle parts or subsystems
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 11/30 - Monitoring
  • H04L 12/46 - Interconnection of networks
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06F 21/60 - Protecting data
  • B60R 25/00 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • H04L 9/40 - Network security protocols
  • H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
  • H04L 12/40 - Bus networks

8.

SYSTEM AND METHOD FOR VALIDATION OF AUTHENTICITY OF COMMUNICATION AT IN-VEHICLE NETWORKS

      
Application Number IL2018051078
Publication Number 2019/069308
Status In Force
Filing Date 2018-10-03
Publication Date 2019-04-11
Owner ARGUS CYBER SECURITY LTD. (Israel)
Inventor Galula, Yaron

Abstract

A system and method for securing data communication in an in-vehicle network may include a security unit adapted to authenticate communication of data between first and second components connected to the network. A security unit may authenticate a communication related to an update of firmware. If a communication of data cannot be authenticated, the security unit may block the communication.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 12/40 - Bus networks

9.

AUTOMOTIVE CYBERSECURITY

      
Application Number IL2018050897
Publication Number 2019/035124
Status In Force
Filing Date 2018-08-13
Publication Date 2019-02-21
Owner ARGUS CYBER SECURITY LTD. (Israel)
Inventor
  • Galula, Yaron
  • Ben Noon, Ofer
  • Lavi, Oron

Abstract

A module for providing security to an in-vehicle communication network having a bus and at least one node connected to the bus, the module including: a memory having software including a model of an expected behavior of data communications over the portion of the in- vehicle communication network; and a processor that processes, responsive to the software in the memory, a plurality of messages registered from a portion of the in-vehicle network to: determine, based on the model and a context comprising attributes of the plurality of messages, whether or not at least one of the messages complies with the model; and if the at least one message does not comply with the model, then perform at least one action on the message.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/40 - Bus networks

10.

Automotive cybersecurity

      
Application Number 15675829
Grant Number 10630699
Status In Force
Filing Date 2017-08-14
First Publication Date 2019-02-14
Grant Date 2020-04-21
Owner Argus Cyber Security Ltd. (Israel)
Inventor
  • Galula, Yaron
  • Ben Noon, Ofer
  • Lavi, Oron

Abstract

A module for providing security to an in-vehicle communication network having a bus and at least one node connected to the bus, the module including: a memory having software including a model of an expected behavior of data communications over the portion of the in-vehicle communication network; and a processor that processes, responsive to the software in the memory, a plurality of messages registered from a portion of the in-vehicle network to: determine, based on the model and a context comprising attributes of the plurality of messages, whether or not at least one of the messages complies with the model; and if the at least one message does not comply with the model, then perform at least one action on the message.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • B60R 16/02 - Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • H04L 12/40 - Bus networks

11.

SYSTEM AND METHOD FOR DETECTING EXPLOITATION OF A COMPONENT CONNECTED TO AN IN-VEHICLE NETWORK

      
Application Number IL2018050888
Publication Number 2019/030763
Status In Force
Filing Date 2018-08-09
Publication Date 2019-02-14
Owner ARGUS CYBER SECURITY LTD. (Israel)
Inventor
  • Galula, Yaron
  • Kruvi, Nizzan

Abstract

A system and method for detecting cyber threats in a vehicle may detecting an event related to exploitation of a component connected to an in-vehicle network based on a deviation of execution of executable code from a reference execution behavior. A deviation may be detected based on a set of whitelists and blacklists. An event related to a deviation may be recorded.

IPC Classes  ?

12.

SYSTEM AND METHOD FOR PROVIDING FLEET CYBER-SECURITY

      
Application Number 15992257
Status Pending
Filing Date 2018-05-30
First Publication Date 2018-12-06
Owner ARGUS CYBER SECURITY LTD. (Israel)
Inventor
  • Galula, Yaron
  • Ben-Noon, Ofer

Abstract

A system and method for providing fleet cyber-security comprising may include collecting, by a plurality of data collection units installed in a respective plurality of vehicles in the fleet, information related to cyber security and including the information in reports to a server. Data in reports may be aggregated, by the server. A cyber-attack may be identified based on aggregated data.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

13.

System and method for providing cyber security to an in-vehicle network

      
Application Number 15915251
Grant Number 11329953
Status In Force
Filing Date 2018-03-08
First Publication Date 2018-09-13
Grant Date 2022-05-10
Owner Argus Cyber Security Ltd. (Israel)
Inventor
  • Atad, Matan
  • Ezra, Shiran
  • Barzilay, Gilad
  • Galula, Yaron

Abstract

A system and method securing an in-vehicle network in a vehicle may include a switch connected to at least two segments of the in-vehicle network and an IDPS connected to the switch. The IDPS unit may be adapted to: receive network messages from the switch; determine at least some of the network messages are related to a cyber threat and configure the switch according to the cyber threat. The IDPS unit may be included in the switch.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
  • H04L 43/00 - Arrangements for monitoring or testing data switching networks
  • H04W 76/16 - Setup of multiple wireless link connections involving different core network technologies, e.g. a packet-switched [PS] bearer in combination with a circuit-switched [CS] bearer
  • H04W 76/12 - Setup of transport tunnels
  • H04L 69/22 - Parsing or analysis of headers
  • H04W 76/15 - Setup of multiple wireless link connections
  • H04W 76/18 - Management of setup rejection or failure
  • H04W 76/19 - Connection re-establishment
  • H04L 43/04 - Processing captured monitoring data, e.g. for logfile generation

14.

In-vehicle network anomaly detection

      
Application Number 15968294
Grant Number 10728101
Status In Force
Filing Date 2018-05-01
First Publication Date 2018-08-30
Grant Date 2020-07-28
Owner Argus Cyber Security Ltd. (Israel)
Inventor
  • Ezra, Shiran
  • Dagmi, Or
  • Barzilay, Gilad
  • Galula, Yaron

Abstract

A method of identifying a node of a plurality of nodes in an in-vehicle communications network that transmitted a waveform propagating in the network, comprising comparing a fingerprint generated for the propagating voltage waveform with a library having library fingerprints that are unique for waveforms transmitted by each node to determine which node transmitted the waveform.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 12/40 - Bus networks
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04W 4/48 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for in-vehicle communication

15.

Tamper tune watchman

      
Application Number 15728512
Grant Number 10818111
Status In Force
Filing Date 2017-10-10
First Publication Date 2018-05-03
Grant Date 2020-10-27
Owner Argus Cyber Security Ltd. (Israel)
Inventor Galula, Yaron

Abstract

A method of determining if a vehicle's performance has been modified, the method comprising: acquiring operational data comprised in communications signals transmitted over a vehicle's in-vehicle network during operation of the vehicle; processing the operational data to determine an operational profile for the vehicle that characterizes actual operation of the vehicle; and determining based on the operational profile if the vehicle performance has undergone modification.

IPC Classes  ?

  • G07C 5/08 - Registering or indicating performance data other than driving, working, idle, or waiting time, with or without registering driving, working, idle, or waiting time
  • G07C 5/00 - Registering or indicating the working of vehicles

16.

System and method for anomaly detection in diagnostic sessions in an in-vehicle communication network

      
Application Number 15727642
Grant Number 10440120
Status In Force
Filing Date 2017-10-09
First Publication Date 2018-04-19
Grant Date 2019-10-08
Owner Argus Cyber Security Ltd. (Israel)
Inventor
  • Galula, Yaron
  • Ezra, Shiran

Abstract

A method of monitoring communications propagating in an in-vehicle communications network of a vehicle, the method comprising: monitoring messages transmitted over at least a portion of the in-vehicle network; determining if the transmitted messages are indicative of a current data transfer session conducted over the in-vehicle network; comparing at least one feature of a message of the transmitted messages to at least one expected feature of a message comprised in a model of the data transfer session to determine whether or not the at least one feature of the transmitted message is expected; determining that the transmitted message is an anomalous message if the feature of the transmitted message is determined to be unexpected.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04W 84/00 - Network topologies
  • B60R 16/023 - Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric for transmission of signals between vehicle parts or subsystems
  • H04W 4/48 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for in-vehicle communication
  • H04W 12/12 - Detection or prevention of fraud
  • H04L 12/40 - Bus networks
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04W 4/021 - Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
  • H04W 4/38 - Services specially adapted for particular environments, situations or purposes for collecting sensor information

17.

Fleet monitoring

      
Application Number 15706715
Grant Number 11628784
Status In Force
Filing Date 2017-09-17
First Publication Date 2018-02-01
Grant Date 2023-04-18
Owner ARGUS CYBER SECURITY LTD. (Israel)
Inventor
  • Ben Noon, Ofer
  • Galula, Yaron
  • Lavi, Oron

Abstract

A system for providing security to a fleet of vehicles, the system comprising: a plurality of modules, each module configured to monitor messages propagating in an in-vehicle network of a vehicle comprised in the fleet; a memory having data characterizing messages, and software executable to: identify an anomaly in communications over the in-vehicle communication network; and instruct a communication interface, configured to support communication with an entity external to the vehicle, to transmit monitoring data responsive to the messages; and a processor configured to execute the software in the memory; and a data monitoring and processing hub external to the vehicles comprised in the fleet and operable to receive transmission of monitoring data from the plurality of modules.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • B60R 16/023 - Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric for transmission of signals between vehicle parts or subsystems
  • H04L 9/40 - Network security protocols
  • G06F 21/60 - Protecting data
  • H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
  • H04L 12/46 - Interconnection of networks
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • B60R 25/00 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
  • G06F 11/30 - Monitoring
  • H04L 12/40 - Bus networks

18.

Message data acquisition

      
Application Number 15706717
Grant Number 11097674
Status In Force
Filing Date 2017-09-17
First Publication Date 2018-02-01
Grant Date 2021-08-24
Owner Argus Cyber Security Ltd. (Israel)
Inventor
  • Ben Noon, Ofer
  • Galula, Yaron
  • Lavi, Oron

Abstract

An in-vehicle communication network comprising at least one node connected to a bus, the network comprising: at least one memory comprising software having data characterizing messages that propagate over the network during normal operation and executable instructions for processing a message based on the data to determine if the message is normal or anomalous; a module operable to: process messages received from the in-vehicle network in accordance with the executable instructions and the data to identify an anomaly in communications over the in-vehicle communication network; accumulate and store information responsive to the processing of the received messages; instruct a communication interface, configured to support communication with an entity external to the vehicle, to upload the stored information or a portion thereof to the entity external to the in-vehicle network.

IPC Classes  ?

  • B60R 16/023 - Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric for transmission of signals between vehicle parts or subsystems
  • G06F 11/30 - Monitoring
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06F 21/60 - Protecting data
  • B60R 25/00 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • H04L 12/46 - Interconnection of networks
  • H04L 12/40 - Bus networks

19.

OBD port access control

      
Application Number 15717980
Grant Number 10493928
Status In Force
Filing Date 2017-09-28
First Publication Date 2018-01-18
Grant Date 2019-12-03
Owner ARGUS CYBER SECURITY LTD. (Israel)
Inventor
  • Ben Noon, Ofer
  • Galula, Yaron
  • Lavi, Oron

Abstract

A module for providing security to an in-vehicle communication network having a bus and at least one node connected to the bus, the module comprising: a memory having software comprising data characterizing messages that the at least one node transmits to and/or receives via the bus; a communication port via which the module receives and transmits messages configured to be connected to a portion of the in-vehicle network; and a processor that is operable to: processes messages received via the port responsive to the software in the memory to control passage of messages through an on-board diagnostics (OBD) port between the in-vehicle network and an entity external to the vehicle.

IPC Classes  ?

  • B60R 16/023 - Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric for transmission of signals between vehicle parts or subsystems
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 11/30 - Monitoring
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/60 - Protecting data
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • B60R 25/00 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
  • H04L 12/46 - Interconnection of networks
  • H04L 12/40 - Bus networks

20.

System and method for detection and prevention of attacks on in-vehicle networks

      
Application Number 15636678
Grant Number 10530793
Status In Force
Filing Date 2017-06-29
First Publication Date 2018-01-04
Grant Date 2020-01-07
Owner Argus Cyber Security Ltd. (Israel)
Inventor
  • Galula, Yaron
  • Ben-Noon, Ofer
  • Lavi, Oron

Abstract

Systems and methods for detection of attacks on a communication authentication layer of an in-vehicle network, including determining, by at least one network node, at least one attack attempt on the communication authentication layer of the in-vehicle network, wherein the determination is carried out by identifying anomalies in at least one of messages, data and metadata directed to the communication authentication layer, and selecting, by the at least one network node, a response corresponding to the determined attack attempt from at least one of modification of parameter values corresponding to a security protocol, a failsafe response, and rejection of messages identified as anomalies.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/85 - Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 12/40 - Bus networks
  • H04L 29/14 - Counter-measures to a fault
  • H04W 4/48 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for in-vehicle communication

21.

Watchman hub

      
Application Number 15675959
Grant Number 10214164
Status In Force
Filing Date 2017-08-14
First Publication Date 2017-11-30
Grant Date 2019-02-26
Owner ARGUS CYBER SECURITY LTD. (Israel)
Inventor
  • Ben Noon, Ofer
  • Galula, Yaron
  • Lavi, Oron

Abstract

A system for providing security to an in-vehicle communication network, the system comprising: a data monitoring and processing hub external to the in-vehicle network, the in-vehicle network having a bus and at least one node connected to the bus; a module configured to monitor messages in communication traffic propagating in the in-vehicle network, the module comprising: at least one communication port via which the module receives and transmits messages; a memory having data characterizing messages that the at least one node transmits and receives during normal operation of the node, and software executable to: identify, responsive to the data characterizing messages, an anomaly in communications over the in-vehicle communication network; and instruct a communication interface, configured to support communication with the hub, to transmit monitoring data responsive to identifying the anomaly to the hub for processing; and a processor configured to execute the software in the memory.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • B60R 16/023 - Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric for transmission of signals between vehicle parts or subsystems
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • B60R 25/00 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
  • G06F 11/30 - Monitoring
  • G06F 21/60 - Protecting data
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 12/46 - Interconnection of networks
  • H04L 12/40 - Bus networks

22.

Context-aware firewall for in-vehicle cyber security

      
Application Number 15671406
Grant Number 10766439
Status In Force
Filing Date 2017-08-08
First Publication Date 2017-11-30
Grant Date 2020-09-08
Owner Argus Cyber Security Ltd. (Israel)
Inventor
  • Ben Noon, Ofer
  • Galula, Yaron
  • Lavi, Oron

Abstract

A module for providing security to a vehicle's in-vehicle communication network that is responsive to an operational state of the vehicle.

IPC Classes  ?

  • B60R 16/023 - Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric for transmission of signals between vehicle parts or subsystems
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 11/30 - Monitoring
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/60 - Protecting data
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • B60R 25/00 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
  • H04L 12/46 - Interconnection of networks
  • H04L 12/40 - Bus networks

23.

NET SLEUTH FOR IN-VEHICLE NETWORK ANOMALY DETECTION

      
Application Number IL2017050485
Publication Number 2017/191632
Status In Force
Filing Date 2017-05-01
Publication Date 2017-11-09
Owner ARGUS CYBER SECURITY LTD. (Israel)
Inventor
  • Dagmi, Or
  • Barzilay, Gilad
  • Galula, Yaron
  • Ben Noon, Ofer
  • Shalev, Amos

Abstract

A method of identifying a node of a plurality of nodes in an in-vehicle communications network that transmitted a waveform propagating in the network, comprising providing a library of fingerprints having a unique library fingerprint for waveforms transmitted by each node and comparing a fingerprint generated for the propagating voltage waveform with library fingerprints to determine which node transmitted the waveform.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 12/40 - Bus networks

24.

Net sleuth

      
Application Number 15582844
Grant Number 10645104
Status In Force
Filing Date 2017-05-01
First Publication Date 2017-11-02
Grant Date 2020-05-05
Owner Argus Cyber Security Ltd. (Israel)
Inventor
  • Dagmi, Or
  • Barzilay, Gilad
  • Galula, Yaron
  • Ben Noon, Ofer
  • Shalev, Amos

Abstract

A method of identifying a node of a plurality of nodes in an in-vehicle communications network that transmitted a waveform propagating in the network, comprising providing a library of fingerprints having a unique library fingerprint for waveforms transmitted by each node and comparing a fingerprint generated for the propagating voltage waveform with library fingerprints to determine which node transmitted the waveform.

IPC Classes  ?

  • H04L 29/00 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/40 - Bus networks
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

25.

Bus watchman

      
Application Number 15607760
Grant Number 10625694
Status In Force
Filing Date 2017-05-30
First Publication Date 2017-09-14
Grant Date 2020-04-21
Owner Argus Cyber Security Ltd. (Israel)
Inventor
  • Ben Noon, Ofer
  • Galula, Yaron
  • Lavi, Oron

Abstract

A cyber security module for providing security to an in-vehicle communication network having a bus, at least one node connected to the bus, and at least one communications device coupled to the in-vehicle communication network configured to interface the in-vehicle network with an external communication network, the cyber security module comprising: a communication port configured to receive a message from the communication device that the communication device generates based on a message that the communication device receives from the external communication network; at least one communication port coupled to the bus; an authentication module configured to authenticate whether or not the message originated from an authorized source; and a processor configured to operate to prevent content of the message from being operated on if the authentication module determines that the source of the message received by the communication device is not from an authorized source.

IPC Classes  ?

  • B60R 16/023 - Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric for transmission of signals between vehicle parts or subsystems
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/60 - Protecting data
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • H04L 12/46 - Interconnection of networks
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • B60R 25/00 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
  • G06F 11/30 - Monitoring
  • H04L 12/40 - Bus networks

26.

System and method for controlling access to an in-vehicle communication network

      
Application Number 15272675
Grant Number 11397801
Status In Force
Filing Date 2016-09-22
First Publication Date 2017-03-30
Grant Date 2022-07-26
Owner Argus Cyber Security Ltd. (Israel)
Inventor
  • Ben-Noon, Ofer
  • Galula, Yaron
  • Lavi, Oron

Abstract

A system or method may include an in-vehicle network including an interface port for connecting an external device to the in-vehicle network; and a security unit connected to the in-vehicle network, the security unit adapted to enable an external device to communicate with the in-vehicle network, over the interface port, based on a security token received from the external device. A system or method may, based on a token, prevent an external device from at least one of: communicating with a selected set of components on in an in-vehicle network, communicating with a selected set of network segments in the in-vehicle network and performing a selected set of operations.

IPC Classes  ?

  • G06F 21/35 - User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/40 - Network security protocols
  • H04W 12/06 - Authentication
  • H04W 12/069 - Authentication using certificates or pre-shared keys
  • H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

27.

System and method for consistency based anomaly detection in an in-vehicle communication network

      
Application Number 15272934
Grant Number 10798114
Status In Force
Filing Date 2016-09-22
First Publication Date 2017-01-12
Grant Date 2020-10-06
Owner Argus Cyber Security Ltd. (Israel)
Inventor
  • Galula, Yaron
  • Ben-Noon, Ofer
  • Kapota, Ofer
  • Kovelman, Alexei

Abstract

A system and method for providing security to a network may include monitoring, by a processor, traffic on a first and second network portions of an in-vehicle communication network; determining whether or not a first message detected on the first network portion is anomalous based on at least one of: an attribute of a second message detected on the second network portion and an absence of a second message from the second network portion over a predefined time period; and, if it is determined the first message is anomalous then performing at least one action.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G07C 5/08 - Registering or indicating performance data other than driving, working, idle, or waiting time, with or without registering driving, working, idle, or waiting time
  • H04W 12/10 - Integrity
  • H04W 12/12 - Detection or prevention of fraud
  • H04W 4/48 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for in-vehicle communication
  • H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
  • H04W 12/00 - Security arrangements; Authentication; Protecting privacy or anonymity

28.

System and method for content based anomaly detection in an in-vehicle communication network

      
Application Number 15196226
Grant Number 11252180
Status In Force
Filing Date 2016-06-29
First Publication Date 2016-12-29
Grant Date 2022-02-15
Owner ARGUS CYBER SECURITY LTD. (Israel)
Inventor
  • Galula, Yaron
  • Ben-Noon, Ofer
  • Lavi, Oron
  • Kovelman, Alexei
  • Kapota, Ofer

Abstract

A system and method for providing security to a network may include maintaining, by a processor, a model of an expected behavior of data communications over an in-vehicle communication network; receiving, by the processor, a plurality of messages communicated over the network; determining, by the processor, based on the model and based on content attributes of the plurality of messages, whether or not at least one of the messages complies with the model; and if at least one message does not comply with the model then performing, by the processor, at least one action related to the message.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G07C 5/08 - Registering or indicating performance data other than driving, working, idle, or waiting time, with or without registering driving, working, idle, or waiting time
  • H04W 12/10 - Integrity
  • H04W 12/12 - Detection or prevention of fraud
  • H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
  • B60R 16/023 - Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric for transmission of signals between vehicle parts or subsystems
  • B60R 25/10 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
  • B60R 25/30 - Detection related to theft or to other events relevant to anti-theft systems
  • B60R 21/01 - Electrical circuits for triggering safety arrangements in case of vehicle accidents or impending vehicle accidents
  • H04W 12/61 - Time-dependent
  • H04W 12/67 - Risk-dependent, e.g. selecting a security level depending on risk profiles
  • H04W 12/68 - Gesture-dependent or behaviour-dependent

29.

System and method for time based anomaly detection in an in-vehicle communication network

      
Application Number 15196301
Grant Number 10298612
Status In Force
Filing Date 2016-06-29
First Publication Date 2016-12-29
Grant Date 2019-05-21
Owner Argus Cyber Security Ltd. (Israel)
Inventor
  • Galula, Yaron
  • Ben-Noon, Ofer
  • Lavi, Oron

Abstract

A system and method for providing security to a network may include maintaining, by a processor, a model of an expected behavior of data communications over the in-vehicle communication network; receiving, by the processor, a message sent over the network; determining, by the processor, based on the model and based on a timing attribute of the message, whether or not the message complies with the model; and if the message does not comply with the model then performing, by the processor, at least one action related to the message.

IPC Classes  ?

  • G06F 21/00 - Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 12/10 - Integrity
  • H04W 12/12 - Detection or prevention of fraud
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • B60R 16/023 - Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric for transmission of signals between vehicle parts or subsystems
  • G07C 5/08 - Registering or indicating performance data other than driving, working, idle, or waiting time, with or without registering driving, working, idle, or waiting time
  • B60R 25/10 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
  • B60R 25/30 - Detection related to theft or to other events relevant to anti-theft systems
  • B60R 21/01 - Electrical circuits for triggering safety arrangements in case of vehicle accidents or impending vehicle accidents

30.

System and method for providing security to a communication network

      
Application Number 15196094
Grant Number 11165851
Status In Force
Filing Date 2016-06-29
First Publication Date 2016-12-29
Grant Date 2021-11-02
Owner Argus Cyber Security Ltd. (Israel)
Inventor
  • Galula, Yaron
  • Ben-Noon, Ofer
  • Lavi, Oron
  • Kapota, Ofer
  • Kovelman, Alexei

Abstract

A system and method for providing security to a network may include identifying a message sent over a network, the message related to a data transfer from an initiator to a target node, and transmitting, over the network, at least one disruptive message that causes the data transfer to fail.

IPC Classes  ?

  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

31.

System and method for content based anomaly detection in an in-vehicle communication network

      
Application Number 15196252
Grant Number 11115433
Status In Force
Filing Date 2016-06-29
First Publication Date 2016-12-29
Grant Date 2021-09-07
Owner ARGUS CYBER SECURITY LTD. (Israel)
Inventor
  • Galula, Yaron
  • Ben-Noon, Ofer
  • Lavi, Oron

Abstract

A system and method for providing security to a network may include maintaining, by a processor, a model of an expected behavior of data communications over the in-vehicle communication network; receiving, by the processor, a message sent over the network; determining, by the processor, based on the model and based on content in the message, whether or not the message complies with the model; and if the message does not comply with the model then performing, by the processor, at least one action related to the message.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04W 12/10 - Integrity
  • H04W 12/12 - Detection or prevention of fraud
  • B60R 16/023 - Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric for transmission of signals between vehicle parts or subsystems
  • G07C 5/08 - Registering or indicating performance data other than driving, working, idle, or waiting time, with or without registering driving, working, idle, or waiting time
  • B60R 25/10 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
  • B60R 25/30 - Detection related to theft or to other events relevant to anti-theft systems
  • B60R 21/01 - Electrical circuits for triggering safety arrangements in case of vehicle accidents or impending vehicle accidents
  • H04W 12/61 - Time-dependent
  • H04W 12/67 - Risk-dependent, e.g. selecting a security level depending on risk profiles
  • H04W 12/68 - Gesture-dependent or behaviour-dependent

32.

System and method for time based anomaly detection in an in-vehicle communication network

      
Application Number 15196338
Grant Number 10708293
Status In Force
Filing Date 2016-06-29
First Publication Date 2016-12-29
Grant Date 2020-07-07
Owner Argus Cyber Security Ltd. (Israel)
Inventor
  • Galula, Yaron
  • Ben-Noon, Ofer
  • Lavi, Oron
  • Kapota, Ofer
  • Kovelman, Alexei

Abstract

A system and method for providing security to a network may include maintaining, by a processor, a model of an expected behavior of data communications over the in-vehicle communication network; receiving, by the processor, a message sent over the network; determining, by the controller, based on the model and based on a timing attribute of the message, whether or not the message complies with the model; and if the message does not comply with the model then performing, by the processor, at least one action related to the message.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 12/10 - Integrity
  • H04W 12/12 - Detection or prevention of fraud
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • B60R 16/023 - Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric for transmission of signals between vehicle parts or subsystems
  • G07C 5/08 - Registering or indicating performance data other than driving, working, idle, or waiting time, with or without registering driving, working, idle, or waiting time
  • B60R 25/10 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles actuating a signalling device
  • B60R 25/30 - Detection related to theft or to other events relevant to anti-theft systems
  • B60R 21/01 - Electrical circuits for triggering safety arrangements in case of vehicle accidents or impending vehicle accidents
  • H04W 12/00 - Security arrangements; Authentication; Protecting privacy or anonymity

33.

Global automotive safety system

      
Application Number 14590022
Grant Number 09616828
Status In Force
Filing Date 2015-01-06
First Publication Date 2015-07-09
Grant Date 2017-04-11
Owner Argus Cyber Security Ltd. (Israel)
Inventor
  • Ben Noon, Ofer
  • Galula, Yaron
  • Lavi, Oron

Abstract

A system for providing security to an in-vehicle communication network, the system comprising: a data monitoring and processing hub; and at least one module configured to monitor messages in communication traffic propagating in a vehicle's in-vehicle network, the network having a bus and at least one node connected to the bus, the module comprising: a communication interface configured to support communication with the hub; a memory having software comprising data characterizing messages that the at least one node transmits and receives during normal operation of the node; at least one communication port via which the module receives and transmits messages configured to be connected to a portion of the in-vehicle network; a processor that processes messages received via the port from the portion of the in-vehicle network responsive to the software in the memory to: identify an anomalous message in the received messages indicative of exposure of the in-vehicle network to damage from a cyber attack; determine an action to be taken by the module that affects the anomalous message; and transmit data responsive to the anomalous message to the hub for processing by the hub via the communication interface.

IPC Classes  ?

  • G06F 11/00 - Error detection; Error correction; Monitoring
  • B60R 16/023 - Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric for transmission of signals between vehicle parts or subsystems
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • B60R 25/00 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
  • G06F 11/30 - Monitoring
  • G06F 21/60 - Protecting data
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

34.

Bus watchman

      
Application Number 14590027
Grant Number 09840212
Status In Force
Filing Date 2015-01-06
First Publication Date 2015-07-09
Grant Date 2017-12-12
Owner Argus Cyber Security Ltd. (Israel)
Inventor
  • Ben Noon, Ofer
  • Galula, Yaron
  • Lavi, Oron

Abstract

A module for providing security to an in-vehicle communication network comprising at least one node, the module being operative to identify an anomalous message in the network indicative of exposure of the in-vehicle network to damage from a cyber attack and transmit at least one signal that alters the anomalous message so that the at least one node will discard it.

IPC Classes  ?

  • B60R 16/023 - Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric for transmission of signals between vehicle parts or subsystems
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • B60R 25/00 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
  • G06F 11/30 - Monitoring
  • G06F 21/60 - Protecting data
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

35.

Hosted watchman

      
Application Number 14590042
Grant Number 10369942
Status In Force
Filing Date 2015-01-06
First Publication Date 2015-07-09
Grant Date 2019-08-06
Owner ARGUS CYBER SECURITY LTD. (Israel)
Inventor
  • Ben Noon, Ofer
  • Galula, Yaron
  • Lavi, Oron

Abstract

An in-vehicle communication network comprising: a bus and at least one node connected to the bus; an in-vehicle network operating system (OS) that manages OS processes, a secondary memory in which process codes for the processes are stored, and a primary memory, into which the OS loads a copy of a process code of a process to enable a processor to run the process and execute the process code; and a module hosted in the OS and having a hook in at least one position of the OS that provides information to the module responsive to operation of the OS that the module processes in accordance with executable instructions that the module comprises to determine if the in-vehicle OS is operating properly.

IPC Classes  ?

  • B60R 16/023 - Electric or fluid circuits specially adapted for vehicles and not otherwise provided for; Arrangement of elements of electric or fluid circuits specially adapted for vehicles and not otherwise provided for electric for transmission of signals between vehicle parts or subsystems
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • B60R 25/00 - Fittings or systems for preventing or indicating unauthorised use or theft of vehicles
  • G06F 11/30 - Monitoring
  • G06F 21/60 - Protecting data
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 12/46 - Interconnection of networks
  • H04L 12/40 - Bus networks